Life’s Certainties: Death, Taxes, and Violating Security Policies

Life’s Certainties: Death, Taxes, and Violating Security Policies

CISO Series
  • On this week's episode of CISO Series Podcast we welcome Bruce Schneier and we discuss violating security policies and privacy.

  • Cyber Security Headlines you need to know include 400 vulnerabilities found in defense industrial bug bounty, the Department of Defense tricked by phishing scam, and Spain's PM infected with Pegasus.

  • On this week's Super Cyber Friday we think about discovering and managing sensitive data in unauthorized locations.

CISO Series Podcast

Life’s Certainties: Death, Taxes, and Violating Security Policies

Life’s Certainties: Death, Taxes, and Violating Security Policies

Andy Ellis, operating partner, YL Ventures and I welcome guest Bruce Schneier, chief of security architecture, Inrupt and fellow and lecturer at Harvard Kennedy School, to discuss:

  • Special tips for new CISOs just starting out and trying to establish their position.

  • We examine where there are market forces fighting the most against achieving societal values in the digital space.

  • What are signs that we're moving in the right direction of developing a digital social contract?

  • And we ask, is "employees violating security policies" the top issue that needs to be resolved?

Thanks to our podcast sponsor, PlexTrac

PlexTrac

Best advice for a CISO...

"

I teach a class in cyber security policy at the Harvard Kennedy School, basically trying to teach cyber security to people who didn’t take math in college doing policy. And I’m trying to teach them about economics. What I said is if there’s one thing they can take away from my class is that they should use policy interventions to solve economic problems that prevent the implementation of technical solutions. Right now that is my best piece of advice. " --Bruce Schneier

Listen to full episode of

Want to skim a past episode?

We have full transcripts of all our podcast episodes. Plus, on your podcast player, we have chapter markers for all the segments. Read the transcripts or skip to your favorite segment.

Check out:

Overheard on Defense in Depth 

"I like to think of compliance as the foundation of everything, and then technology fits into the compliance piece. However, I also feel like this is changing in a sense. I feel like it’s kind of like two gears fitting together. If we could get those cogs in the gears like in a tractor… If the gears are properly aligned, it’s perfect. You have success." -Linda White, director of InfoSec, Axiom Medical

Listen to full episode of

Cyber Security Headlines 

Top headlines for Tuesday, May 3, 2022:

  • 400 vulnerabilities found in defense industrial bug bounty

  • Department of Defense tricked by phishing scam

  • Spain's PM infected with Pegasus

to this episode.

or subscribe to the daily newsletter.

Join the LIVE "Week In Review" for

Cyber Security Headlines

this and every Friday at 3:30 PM ET/12:30 PM PT for a short 20-minute discussion of the week's cyber news. You can participate live in the conversation by registering

.

or subscribe to the daily newsletter.

Thanks to our Cyber Security Headlines sponsor, Censys

Censys

Super Cyber Fridays!

4 Explanations of Shadow Data in 90 Seconds

Hacking Shadow Data" - Super Cyber Friday

In this video, I challenge Roey Yaacovi, co-founder and CTO, Polar Security to provide a variety of explanations of shadow data.

It’s all a tease for this Friday’s (May 6th, 2022) Super Cyber Friday.

Our topic of discussion will be “Hacking Shadow Data: An hour of critical thinking about discovering and managing sensitive data in unauthorized locations.”

Also joining us for this discussion will be Timothy Rohrbaugh, CISO, JetBlue.

Thanks to our Super Cyber Friday sponsor, Polar Security

Polar Security